-/* $OpenBSD: cert.c,v 1.129 2024/03/22 03:38:12 job Exp $ */
+/* $OpenBSD: cert.c,v 1.130 2024/04/21 19:27:44 claudio Exp $ */
/*
* Copyright (c) 2022 Theo Buehler <tb@openbsd.org>
* Copyright (c) 2021 Job Snijders <job@openbsd.org>
}
X509_ALGOR_get0(&cobj, NULL, NULL, palg);
nid = OBJ_obj2nid(cobj);
- if (nid == NID_ecdsa_with_SHA256) {
+ if (experimental && nid == NID_ecdsa_with_SHA256) {
if (verbose)
warnx("%s: P-256 support is experimental", fn);
} else if (nid != NID_sha256WithRSAEncryption) {
-/* $OpenBSD: cms.c,v 1.43 2024/04/21 09:03:22 job Exp $ */
+/* $OpenBSD: cms.c,v 1.44 2024/04/21 19:27:44 claudio Exp $ */
/*
* Copyright (c) 2019 Kristaps Dzonsons <kristaps@bsd.lv>
*
X509_ALGOR_get0(&obj, NULL, NULL, psig);
nid = OBJ_obj2nid(obj);
/* RFC7935 last paragraph of section 2 specifies the allowed psig */
- if (nid == NID_ecdsa_with_SHA256) {
+ if (experimental && nid == NID_ecdsa_with_SHA256) {
if (verbose)
warnx("%s: P-256 support is experimental", fn);
} else if (nid != NID_rsaEncryption &&
-/* $OpenBSD: crl.c,v 1.33 2024/04/15 13:57:45 job Exp $ */
+/* $OpenBSD: crl.c,v 1.34 2024/04/21 19:27:44 claudio Exp $ */
/*
* Copyright (c) 2019 Kristaps Dzonsons <kristaps@bsd.lv>
*
}
X509_ALGOR_get0(&cobj, NULL, NULL, palg);
nid = OBJ_obj2nid(cobj);
- if (nid == NID_ecdsa_with_SHA256) {
+ if (experimental && nid == NID_ecdsa_with_SHA256) {
if (verbose)
warnx("%s: P-256 support is experimental", fn);
} else if (nid != NID_sha256WithRSAEncryption) {
-/* $OpenBSD: extern.h,v 1.216 2024/04/15 13:57:45 job Exp $ */
+/* $OpenBSD: extern.h,v 1.217 2024/04/21 19:27:44 claudio Exp $ */
/*
* Copyright (c) 2019 Kristaps Dzonsons <kristaps@bsd.lv>
*
/* global variables */
extern int verbose;
+extern int noop;
extern int filemode;
extern int excludeaspa;
+extern int experimental;
extern const char *tals[];
extern const char *taldescs[];
extern unsigned int talrepocnt[];
-/* $OpenBSD: filemode.c,v 1.40 2024/03/22 03:38:12 job Exp $ */
+/* $OpenBSD: filemode.c,v 1.41 2024/04/21 19:27:44 claudio Exp $ */
/*
* Copyright (c) 2019 Claudio Jeker <claudio@openbsd.org>
* Copyright (c) 2019 Kristaps Dzonsons <kristaps@bsd.lv>
#include "extern.h"
#include "json.h"
-extern int verbose;
-
static X509_STORE_CTX *ctx;
static struct auth_tree auths = RB_INITIALIZER(&auths);
static struct crl_tree crlt = RB_INITIALIZER(&crlt);
-/* $OpenBSD: output-json.c,v 1.48 2024/04/08 14:02:13 tb Exp $ */
+/* $OpenBSD: output-json.c,v 1.49 2024/04/21 19:27:44 claudio Exp $ */
/*
* Copyright (c) 2019 Claudio Jeker <claudio@openbsd.org>
*
#include "extern.h"
#include "json.h"
-extern int experimental;
-
static void
outputheader_json(struct stats *st)
{
-/* $OpenBSD: parser.c,v 1.134 2024/04/17 15:03:22 tb Exp $ */
+/* $OpenBSD: parser.c,v 1.135 2024/04/21 19:27:44 claudio Exp $ */
/*
* Copyright (c) 2019 Claudio Jeker <claudio@openbsd.org>
* Copyright (c) 2019 Kristaps Dzonsons <kristaps@bsd.lv>
#include "extern.h"
-extern int noop;
-extern int experimental;
-extern int verbose;
-
static X509_STORE_CTX *ctx;
static struct auth_tree auths = RB_INITIALIZER(&auths);
static struct crl_tree crlt = RB_INITIALIZER(&crlt);
-/* $OpenBSD: repo.c,v 1.56 2024/04/08 14:02:13 tb Exp $ */
+/* $OpenBSD: repo.c,v 1.57 2024/04/21 19:27:44 claudio Exp $ */
/*
* Copyright (c) 2021 Claudio Jeker <claudio@openbsd.org>
* Copyright (c) 2019 Kristaps Dzonsons <kristaps@bsd.lv>
#include "extern.h"
extern struct stats stats;
-extern int noop;
extern int rrdpon;
extern int repo_timeout;
extern time_t deadline;